Threat Hunting Malware Infrastructure
☆11Dec 3, 2023Updated 2 years ago
Alternatives and similar repositories for ohcti-malwareinfra
Users that are interested in ohcti-malwareinfra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell sandboxing utility☆19Mar 2, 2026Updated 3 weeks ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆68Dec 1, 2023Updated 2 years ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆16Jan 8, 2026Updated 2 months ago
- ☆29May 1, 2020Updated 5 years ago
- ☆20Jan 14, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- YesMan☆16Nov 8, 2023Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆17Feb 16, 2024Updated 2 years ago
- Shadow APK Crypter☆13May 31, 2025Updated 9 months ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Script to check for CVE-2023-36884 hardening☆15Jul 18, 2023Updated 2 years ago
- Automated CIS Benchmark Compliance Remediation for Windows 11 Enterprise with Ansible☆36May 5, 2025Updated 10 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated last month
- ☆21Apr 19, 2024Updated last year
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- ☆12Jun 12, 2023Updated 2 years ago
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- ☆23Jul 7, 2023Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- ☆12Sep 2, 2016Updated 9 years ago
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Apr 29, 2020Updated 5 years ago
- Vulnerability and security bulletins related to Palantir software products.☆13Mar 3, 2023Updated 3 years ago
- A Python package and command-line interface (CLI) tool for asynchronous OSINT username enumeration using the WhatsMyName dataset☆31Feb 16, 2026Updated last month
- ☆35Jan 13, 2026Updated 2 months ago
- ☆12Apr 25, 2020Updated 5 years ago
- Threat Hunting queries of multiple platforms☆64Feb 26, 2026Updated last month
- x64dbg Automate's Python Client - Easy Scriptable and Repeatable Debug Sessions☆30Mar 18, 2026Updated last week
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- UnFuck Windows Setup☆23Aug 16, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- Raspberry Pi projects☆16Jan 16, 2017Updated 9 years ago
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆117Mar 22, 2026Updated last week
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago
- Demo showcasing Maldev Academy’s code search database☆41Feb 20, 2024Updated 2 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Apr 7, 2015Updated 10 years ago